Integrating Security Patterns with Security Requirements Analysis Using Contextual Goal Models. Li, T., Horkoff, J., & Mylopoulos, J. In Frank, U., Loucopoulos, P., Pastor, O., & Petrounias, I., editors, The Practice of Enterprise Modeling - 7th IFIP WG 8.1 Working Conference, PoEM 2014, Manchester, UK, November 12-13, 2014. Proceedings, volume 197, of Lecture Notes in Business Information Processing, pages 208–223, 2014. Springer.
Integrating Security Patterns with Security Requirements Analysis Using Contextual Goal Models [link]Paper  doi  bibtex   
@inproceedings{DBLP:conf/ifip8-1/LiHM14,
  author       = {Tong Li and
                  Jennifer Horkoff and
                  John Mylopoulos},
  editor       = {Ulrich Frank and
                  Pericles Loucopoulos and
                  Oscar Pastor and
                  Ilias Petrounias},
  title        = {Integrating Security Patterns with Security Requirements Analysis
                  Using Contextual Goal Models},
  booktitle    = {The Practice of Enterprise Modeling - 7th {IFIP} {WG} 8.1 Working
                  Conference, PoEM 2014, Manchester, UK, November 12-13, 2014. Proceedings},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {197},
  pages        = {208--223},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45501-2\_15},
  doi          = {10.1007/978-3-662-45501-2\_15},
  timestamp    = {Mon, 18 Jan 2021 08:56:43 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip8-1/LiHM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}

Downloads: 0